Difference between revisions of "S5L8720"

From The iPhone Wiki
Jump to: navigation, search
(Exploits)
(Boot Chain)
Line 17: Line 17:
   
 
==Boot Chain==
 
==Boot Chain==
[[VROM (S5L8720)|VROM]]->[[LLB]]->[[iBoot]]->[[Kernel]]->[[Firmware|System Software]]
+
[[VROM]]->[[LLB]]->[[iBoot]]->[[Kernel]]->[[Firmware|System Software]]
   
It is definitely worthy to note that the [[Pwnage]] exploit is fixed because the images are now flashed to the [[NOR]] in their encrypted [[IMG3 File Format|IMG3]] containers, and the [[VROM (S5L8720)|bootrom]] can properly check [[LLB]]'s signature. That being said, unsigned images can still be run using the [[0x24000 Segment Overflow]].
+
It is definitely worthy to note that the [[Pwnage]] exploit is fixed because the images are now flashed to the [[NOR]] in their encrypted [[IMG3 File Format|IMG3]] containers, and the [[S5L8720 (Bootrom)|bootrom]] can properly check [[LLB]]'s signature. That being said, unsigned images can still be run using the [[0x24000 Segment Overflow]], provided the [[S5L8720 (Bootrom)|bootrom]] is [[iBoot-240.4|old enough]].
   
 
==See Also==
 
==See Also==

Revision as of 03:34, 8 August 2010

This is the Application Processor used on the iPod Touch 2G.

Exploits

iBoot / Kernel Level

Note: iBoot on the S5L8720 can be downgraded, allowing any of these exploits to be used on future firmwares

Bootrom

Userland

Boot Chain

VROM->LLB->iBoot->Kernel->System Software

It is definitely worthy to note that the Pwnage exploit is fixed because the images are now flashed to the NOR in their encrypted IMG3 containers, and the bootrom can properly check LLB's signature. That being said, unsigned images can still be run using the 0x24000 Segment Overflow, provided the bootrom is old enough.

See Also

External Links